D:\3dmWorkSpace\AlphaROMSource\AlphaROM\x64\Release\3DMLoader.pdb
Behavioral task
behavioral1
Sample
GTA5.Crack.v3.For.Update.2/Crack/3dmgame.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
GTA5.Crack.v3.For.Update.2/Crack/3dmgame.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
GTA5.Crack.v3.For.Update.2/Crack/Launcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
GTA5.Crack.v3.For.Update.2/Crack/Launcher.exe
Resource
win10v2004-20240802-en
General
-
Target
ff851850aba0f0afef4372b6d8a066d9_JaffaCakes118
-
Size
472KB
-
MD5
ff851850aba0f0afef4372b6d8a066d9
-
SHA1
d97b9a5a41ac8e29f51bd9489e3851f298c2032d
-
SHA256
da6891e694a42747043a326198162ce5f90fd2e66db47bef2209965d7c0de837
-
SHA512
45ef21146baec580c4119a6e36cef2537fce6b111309785ff8737288afdfea7c85e818ad3c21358fcc6d05ef4735e6b8c9a092f57241621a867f4c9cdc3c3d77
-
SSDEEP
6144:MOEQpycSCyoLzdJtAKyMr2jPurYO76HgvEA7L3Ew7//1vXCa/IcaYpoGmjAhw:MZQJSCyQzztAKyMr2D8Jl7//FXH3eCw
Malware Config
Signatures
-
resource yara_rule static1/unpack001/GTA5.Crack.v3.For.Update.2/Crack/3dmgame.dll vmprotect -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/GTA5.Crack.v3.For.Update.2/Crack/3dmgame.dll unpack001/GTA5.Crack.v3.For.Update.2/Crack/Launcher.exe
Files
-
ff851850aba0f0afef4372b6d8a066d9_JaffaCakes118.rar
-
GTA5.Crack.v3.For.Update.2/Crack/3dmgame.dll.dll windows:5 windows x64 arch:x64
7560559e440329287c6c17f74a69162f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
GetCurrentThread
GetThreadContext
VirtualQuery
GetCurrentProcess
GetModuleHandleW
VirtualFree
InitializeCriticalSection
Sleep
LeaveCriticalSection
SetThreadPriority
FlushInstructionCache
GetProcAddress
VirtualAlloc
EnterCriticalSection
VirtualProtectEx
OpenThread
GetSystemInfo
GetThreadPriority
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
SuspendThread
ResumeThread
CreateFileA
lstrlenA
QueueUserAPC
DisableThreadLibraryCalls
VirtualAllocEx
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
VirtualProtect
GetCurrentDirectoryA
WriteProcessMemory
CreateThread
DecodePointer
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
EncodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
TerminateProcess
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
MessageBoxExW
CharUpperA
shell32
SHCreateDirectoryExW
SHGetSpecialFolderPathW
msvcr100
free
malloc
sprintf
strstr
_access
_wfopen
wcsstr
rand
fwrite
_localtime64
fclose
_time64
_malloc_crt
_initterm
_initterm_e
_encoded_null
_amsg_exit
__C_specific_handler
__CppXcptFilter
__crt_debugger_hook
__clean_type_info_names_internal
_unlock
__dllonexit
_lock
_onexit
_snprintf
fflush
__iob_func
memmove
_wassert
memcpy
printf
memset
shlwapi
PathFileExistsW
PathAppendW
PathAddBackslashW
Sections
.text Size: - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 900B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp2 Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
GTA5.Crack.v3.For.Update.2/Crack/3dmgame.ini
-
GTA5.Crack.v3.For.Update.2/Crack/Launcher.exe.exe windows:5 windows x64 arch:x64
27832b03245210305d132e03a450e4fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
lstrcpyA
lstrlenA
GetStartupInfoA
CreateProcessA
VirtualAllocEx
WriteProcessMemory
GetProcAddress
GetModuleHandleA
CreateRemoteThread
WaitForSingleObject
VirtualFreeEx
ResumeThread
GetCurrentDirectoryA
GetPrivateProfileStringA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DecodePointer
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetSystemTimeAsFileTime
TerminateProcess
EncodePointer
Sleep
msvcr100
__crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
__set_app_type
_fmode
_commode
_configthreadlocale
_initterm_e
_initterm
__initenv
exit
_cexit
_exit
_XcptFilter
__C_specific_handler
__getmainargs
_amsg_exit
sprintf
__setusermatherr
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 494KB - Virtual size: 494KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ